Stryker reported first quarter 2026 results on April 30 with the cyber outage that hit the company on March 11 fully visible in the numbers. Q1 sales of $6.02 billion missed analyst estimates by roughly $320 million, and adjusted EPS of $2.60 came in $0.38 below consensus, with the company attributing the gap to roughly three weeks of operational disruption that delayed shipments and depressed manufacturing absorption. Mako installations posted a record Q1 in both the U.S. and internationally despite the outage, and CEO Kevin Lobo held the company’s full-year organic growth guidance of 8% to 9.5%. One week earlier, Medtronic disclosed and contained a separate cyberattack on its corporate IT systems with no operational impact reported. The combined picture across the two reports is that connected medtech has moved into a sustained cyber-pressure environment, and the strategic question for surgical robotics and interventional device founders is no longer whether to invest in operational resilience but how visibly that resilience shows up when the next attack lands.
Stryker Q1 Sales Took a $320 Million Hit From the March Cyber Outage
Stryker confirmed on its April 30 earnings call that the March 11 cybersecurity event caused approximately three weeks of global operational disruption and reduced both shipment volume and manufacturing absorption in the quarter. Q1 net sales of $6.02 billion grew 2.4% organically, well below the 8% to 9.5% trajectory the company is guiding for the full year, and adjusted EPS of $2.60 missed consensus by $0.38. Lobo described a recovery process he characterized as fast and successful, citing rapid threat removal, recovery of backups, and what he called strong customer communication during the disruption. The company maintained its full-year organic growth and adjusted EPS guidance, signaling that the lost Q1 volume is expected to be recovered across the remaining quarters rather than written off.
The Mako line was the most strategically important data point in the report. Mako had its best ever Q1 for installations both domestically and internationally, with strong utilization rates and continued momentum into the Mako Shoulder launch on Mako 4 mid-year. Lobo’s direct line on the call was that Mako would have been even higher had the company been able to keep shipping through the end of the quarter. The signal for surgical robotics founders is that capital-equipment buying decisions in orthopedic robotics did not pause when the supplier had a global IT outage. Hospitals continued to install systems, the salesforce continued to close, and the customer relationships absorbed the operational stress. The ability of the Mako franchise to compound through the disruption is the kind of operational resilience that translates directly into multi-quarter revenue.
For founders building robotic platforms, the relevant takeaway is that cyber-driven operational disruption is now part of the planning environment for major medtech competitors, and the recovery quality is being scored explicitly by both customers and the capital markets. The Q1 stock recovery on the maintained guidance was a vote on the credibility of the recovery, not on the absence of the incident.
Medtronic Disclosed and Contained a Separate Cyberattack One Week Earlier
Medtronic announced on April 24 that it had identified and contained a cyberattack on its corporate IT network, with no impact on products, manufacturing, distribution, customer connections, or financial reporting systems. The company stated that its corporate IT environment is maintained separately from the networks that support its products and operational systems, which limited the blast radius of the incident. The data-extortion group ShinyHunters had earlier claimed responsibility and asserted exfiltration of more than 9 million records, a claim Medtronic has not verified. The disclosure followed an SEC filing on April 18.
The contrast between the Medtronic and Stryker outcomes is the operational story of the past six weeks in medtech IT. Medtronic absorbed the attack with no disclosed operational or product impact, supported by the architectural separation of its corporate and operational networks. Stryker absorbed roughly three weeks of global operational disruption, primarily because the affected Microsoft environment was load-bearing across both corporate and operational workflows. The architectural choice that determines how much of the company is taken offline by an attack on the corporate IT environment is now a strategic-grade decision, and it is being graded in earnings reports.
For founders building connected medtech and surgical robotics platforms, the architectural separation question is now on the same operational priority list as cybersecurity hygiene. A platform whose product, manufacturing, and customer-connection networks are downstream of a single corporate IT environment will see the next disruption translate into the same kind of operational outage Stryker absorbed. A platform whose operational and product networks are run as a separate environment can continue to operate through a corporate IT incident, which is the architectural posture that allowed Medtronic to disclose without an operational impact.
The Sector Now Has a Sustained Pattern of Targeting
The Stryker and Medtronic incidents come on top of a broader pattern of cyberattacks against U.S. medical device makers in 2025 and 2026, with separately reported intrusions affecting other major medtech players over the past 12 months. The threat-actor pattern is mixed across nation-state-linked groups and financially motivated extortion crews, with Iran-linked actors named in the Stryker incident and ShinyHunters claiming the Medtronic intrusion. The diversity of the attacker profiles is itself a signal that medtech is now a recognized target category, not an opportunistic one.
The operational implications for founders building in this category are concrete. Hospital procurement teams are increasingly asking suppliers about the architectural separation of corporate IT from product and operational systems, the documented incident-response posture, and the resilience of the supply chain to single-environment outages. Investor diligence is asking about the cybersecurity-readiness posture of the engineering team and the planned spend ratio for security work as a percentage of R&D. The work is no longer optional for early-stage companies that intend to ship a connected device into a U.S. hospital network in the next 36 months.
What Changes for Surgical Robotics and Interventional Device Founders
Three operational shifts follow from this week’s reports. The first is that cybersecurity work has moved from a compliance line item into a category that competes for capital with clinical evidence, regulatory submissions, and commercial buildout, and it deserves the same operating cadence and senior leadership ownership. The second is that the architectural separation of corporate IT from product and operational systems is now a design decision with direct earnings consequences, and the right time to make that decision is during early product architecture rather than after the first major hospital deployment. The third is that the credibility of the incident-response posture, including the runbooks, the practice cadence, and the customer-communication script, is now a piece of the diligence story for both hospital procurement and downstream investors.
Founders building connected surgical robotics and interventional devices should treat this week’s reports as the working baseline for what hospital and investor counterparties expect. The companies that have been treating cybersecurity as an IT-team problem are going to be visibly behind the companies that have been treating it as a strategic operating problem.
Dave’s take
The Stryker recovery was impressive and the Mako numbers prove that customer relationships can absorb a serious operational hit when the supplier handles the recovery well. What I want every surgical robotics and interventional device founder I work with to take from this week is that the architectural decision to separate operational networks from corporate IT is the kind of unglamorous infrastructure work that nobody asks about until it determines whether you ship through your next incident or stop shipping for a month. Make the decision early when it costs a few engineering quarters, not late when it costs a quarter of revenue and a chunk of your customer trust.
I’m here to help you scale.
Work With Dave